General

  • Target

    2025-01-16_8071e2121b0b8c80b26ec9e9b8f91822_frostygoop_poet-rat_snatch

  • Size

    5.5MB

  • Sample

    250116-y6ermsxmdy

  • MD5

    8071e2121b0b8c80b26ec9e9b8f91822

  • SHA1

    89d2fe5f8c1c4d58b406fb3920ff982aab86c0ef

  • SHA256

    96f295bb85b44315363367110389e930e124c893e1b06a719b278aa76a1dbd43

  • SHA512

    54a1e4e1c9599d48dd99987c4b589b5c6ed5aacf0fae5b9b39069bfe55999e01d9c10062a8006a497af5f6eca20ec2fbdee09515d85048e142175490168d210c

  • SSDEEP

    49152:AwIoz1/kUsrBoA1Lz5VorkbTg9tj1+XkyT1u/9OrIXURR6lbEsKgvYVl9N/CV6xL:AwBz1sdBoA59Voh1+U6RRlgvgJ/p

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://jokeprvffat.cyou/api

Targets

    • Target

      2025-01-16_8071e2121b0b8c80b26ec9e9b8f91822_frostygoop_poet-rat_snatch

    • Size

      5.5MB

    • MD5

      8071e2121b0b8c80b26ec9e9b8f91822

    • SHA1

      89d2fe5f8c1c4d58b406fb3920ff982aab86c0ef

    • SHA256

      96f295bb85b44315363367110389e930e124c893e1b06a719b278aa76a1dbd43

    • SHA512

      54a1e4e1c9599d48dd99987c4b589b5c6ed5aacf0fae5b9b39069bfe55999e01d9c10062a8006a497af5f6eca20ec2fbdee09515d85048e142175490168d210c

    • SSDEEP

      49152:AwIoz1/kUsrBoA1Lz5VorkbTg9tj1+XkyT1u/9OrIXURR6lbEsKgvYVl9N/CV6xL:AwBz1sdBoA59Voh1+U6RRlgvgJ/p

    Score
    10/10
    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks